Jump to content

The Wi-Fi alliance releases WPA3 which promises better security and simplified Wi-Fi configurations

Source: Wi-Fi Alliance

 

Quote

router-1410802784wzh-990x743.jpg

 

Las Vegas, NV – January 8, 2018 – Wi-Fi Alliance® introduces enhancements and new features for Wi-Fi Protected Access®, the essential family of Wi-Fi CERTIFIED™ security technologies for more than a decade. Wi-Fi Alliance is launching configuration, authentication, and encryption enhancements across its portfolio to ensure Wi-Fi CERTIFIED devices continue to implement state of the art security protections.

 

Building on the widespread adoption and success of WPA2, Wi-Fi Alliance will also deliver a suite of features to simplify Wi-Fi security configuration for users and service providers, while enhancing Wi-Fi network security protections. Four new capabilities for personal and enterprise Wi-Fi networks will emerge in 2018 as part of Wi-Fi CERTIFIED WPA3™. Two of the features will deliver robust protections even when users choose passwords that fall short of typical complexity recommendations, and will simplify the process of configuring security for devices that have limited or no display interface. Another feature will strengthen user privacy in open networks through individualized data encryption. Finally, a 192-bit security suite, aligned with the Commercial National Security Algorithm (CNSA) Suite from the Committee on National Security Systems, will further protect Wi-Fi networks with higher security requirements such as government, defense, and industrial.

So say goodbye to KRACK vulnerability with WPA3. Current WPA2 protocol only uses 128-bit encryption whereas this one uses 192-bit which means much more difficult to brute force. Aside from a higher encryption block, the alliance promises simplified configurations as well. I don't know when will the likes of Asus, Google, and makers of networking stuff release a refresh to their line which will replace WPA2 with WPA3. Unfortunately at the moment there are no technical specifications posted. 

 

If security is concerned, why is it WPA still doesn't implement perfect forward secrecy which makes past and future sessions secrprotected even if the current encryption keys for the present session was stolen. That could improve security and I'm sure someone in the future will find holes and vulnerabilities with WPA3. I bet consumers would be the first ones to buy routers with WPA3, many if not all corporations have the tendency to slack off when it comes to cyber security if it requires so much money to replace equipment that has been running fine for years and can cost thousands of dollars.

Edited by hey_yo_

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, M.Yurizaki said:

An increase of 64-bits of entropy seems kind of wah. Is 256-bit encryption too hard for these routers or something?

Yeah. I also would like to know if perfect forward secrecy is hard to add for the wifi alliance. Maybe with WPA4 we'll get 256-bit encryption and perfect forward secrecy? ¯\_(ツ)_/¯

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, hey_yo_ said:

Yeah. I also would like to know if perfect forward secrecy is hard to add for the wifi alliance. Maybe with WPA4 we'll get 256-bit encryption and perfect forward secrecy? ¯\_(ツ)_/¯

Yay for planned obsolescence?

Link to comment
Share on other sites

Link to post
Share on other sites

9 minutes ago, M.Yurizaki said:

An increase of 64-bits of entropy seems kind of wah. Is 256-bit encryption too hard for these routers or something?

Wanna bet those bastards(manufacturers) doing the encryption in CPU and no HW acceleration? 9_9 (/OFF your previous avatar was better :D )

 

6 minutes ago, M.Yurizaki said:

Yay for planned obsolescence?


Or better yet Openwrt/DDWRT... :D

Edited by jagdtigger
Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, M.Yurizaki said:

Yay for planned obsolescence?

Since a lot of routers got their security patch for KRACK, I'll probably keep my router with WPA2 and I think most people will keep their WPA2 routers for a few more years including big corporations. But I'm sure routers sold in mid 2018 will most likely use WPA3 by default.

Edited by hey_yo_

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, hey_yo_ said:

Since a lot of routers got their security patch for KRACK, I'll probably keep my router with WPA2 and I think most people will keep their WPA2 routers for a few more years including big corporations. But I'm sure routers sold in mid 2018 will most likely use WPA3 by default.

Well good for them,  i have a archer c7 and a ap500 but no updates for them.

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, jagdtigger said:

Wanna bet those bastards(manufacturers) doing the encryption in CPU and no HW acceleration? 9_9 (/OFF your previous avatar was better :D )

Would you want manufacturers to add a Secure Enclave (Apple)/Secure Processing Unit (Qualcomm)-like chip in routers? That would be nice.

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, hey_yo_ said:

Would you want manufacturers to add a Secure Enclave (Apple)/Secure Processing Unit (Qualcomm)-like chip in routers? That would be nice.

OFC not... :D Just the acceleration part without the black box ;) . Anyway my next AP will be a business grade one thats for sure. Consumer solutions have way too short support cycle... :/

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, jagdtigger said:

Well good for them,  i have a archer c7 and a ap500 but no updates for them.

A VPN can protect you from KRACK. As indicated in this Windows Central article, only a handful of manufacturers released a patch for KRACK although that might have changed at the moment.

 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, hey_yo_ said:

Would you want manufacturers to add a Secure Enclave (Apple)/Secure Processing Unit (Qualcomm)-like chip in routers? That would be nice.

I wouldn't mind a router running on a Snapdragon 835 with 8GB of ram and 32GB of storage, with WRT as the OS! Maybe 2 USB 3.1gen1 ports. That would be pretty 'nanners! 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, jagdtigger said:

Just the acceleration part without the black box

Most ARM SoCs already does hardware accelerated encryption. The common ones used by routers I think is the ARM Cortex-A9 which according to ARM's website has "TrustZone security technology" which I think is the one handling crypto acceleration as well.

 

Architecture-of-TEE%20copy.png?revision=e89346f9-a8c6-456b-b482-4695624e9206&h=720&w=1000&la=en&hash=D80A299C14EF5E21DDC8506290123B850AB7DF7B

 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Sniperfox47 said:

I wouldn't mind a router running on a Snapdragon 835 with 8GB of ram and 32GB of storage, with WRT as the OS! Maybe 2 USB 3.1gen1 ports. That would be pretty 'nanners! 

8GB of RAM on a router? Wut? IS DD-WRT even that resource hungry? O.o

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, hey_yo_ said:

8GB of RAM on a router? Wut? IS DD-WRT even that resource hungry? O.o

Nah. But think about all the crazy stuff you could run off your router then! Minecraft server? Video transcription server? xD

Link to comment
Share on other sites

Link to post
Share on other sites

"Put as much effort into your question as you'd expect someone to give in an answer"- @Princess Luna

Make sure to Quote posts or tag the person with @[username] so they know you responded to them!

 RGB Build Post 2019 --- Rainbow 🦆 2020 --- Velka 5 V2.0 Build 2021

Purple Build Post ---  Blue Build Post --- Blue Build Post 2018 --- Project ITNOS

CPU i7-4790k    Motherboard Gigabyte Z97N-WIFI    RAM G.Skill Sniper DDR3 1866mhz    GPU EVGA GTX1080Ti FTW3    Case Corsair 380T   

Storage Samsung EVO 250GB, Samsung EVO 1TB, WD Black 3TB, WD Black 5TB    PSU Corsair CX750M    Cooling Cryorig H7 with NF-A12x25

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, TVwazhere said:

 

Oh it was a repost. Just saw it now. ;)

Edited by hey_yo_

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

When am I going to start seeing these at Best Buy, though?

Link to comment
Share on other sites

Link to post
Share on other sites

Networking tech has always been my weakspot, is this awesome?

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, hey_yo_ said:

Most ARM SoCs already does hardware accelerated encryption. The common ones used by routers I think is the ARM Cortex-A9 which according to ARM's website has "TrustZone security technology" which I think is the one handling crypto acceleration as well.

 

Spoiler

Architecture-of-TEE%20copy.png?revision=e89346f9-a8c6-456b-b482-4695624e9206&h=720&w=1000&la=en&hash=D80A299C14EF5E21DDC8506290123B850AB7DF7B

 

Great, on more gaping hole on my network...

 

19 minutes ago, Sniperfox47 said:

I wouldn't mind a router running on a Snapdragon 835 with 8GB of ram and 32GB of storage, with WRT as the OS! Maybe 2 USB 3.1gen1 ports. That would be pretty 'nanners! 

Build a pfsense box? :D

Edited by jagdtigger
Link to comment
Share on other sites

Link to post
Share on other sites

36 minutes ago, M.Yurizaki said:

An increase of 64-bits of entropy seems kind of wah. Is 256-bit encryption too hard for these routers or something?

Got to go up in increments so to sell more products!

Intel Xeon E5 1650 v3 @ 3.5GHz 6C:12T / CM212 Evo / Asus X99 Deluxe / 16GB (4x4GB) DDR4 3000 Trident-Z / Samsung 850 Pro 256GB / Intel 335 240GB / WD Red 2 & 3TB / Antec 850w / RTX 2070 / Win10 Pro x64

HP Envy X360 15: Intel Core i5 8250U @ 1.6GHz 4C:8T / 8GB DDR4 / Intel UHD620 + Nvidia GeForce MX150 4GB / Intel 120GB SSD / Win10 Pro x64

 

HP Envy x360 BP series Intel 8th gen

AMD ThreadRipper 2!

5820K & 6800K 3-way SLI mobo support list

 

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, M.Yurizaki said:

An increase of 64-bits of entropy seems kind of wah. Is 256-bit encryption too hard for these routers or something?

192 bit is perfectly acceptable, even with shortcuts AES-128 is still outside of brute force capability for the next couple of decades.

[Out-of-date] Want to learn how to make your own custom Windows 10 image?

 

Desktop: AMD R9 3900X | ASUS ROG Strix X570-F | Radeon RX 5700 XT | EVGA GTX 1080 SC | 32GB Trident Z Neo 3600MHz | 1TB 970 EVO | 256GB 840 EVO | 960GB Corsair Force LE | EVGA G2 850W | Phanteks P400S

Laptop: Intel M-5Y10c | Intel HD Graphics | 8GB RAM | 250GB Micron SSD | Asus UX305FA

Server 01: Intel Xeon D 1541 | ASRock Rack D1541D4I-2L2T | 32GB Hynix ECC DDR4 | 4x8TB Western Digital HDDs | 32TB Raw 16TB Usable

Server 02: Intel i7 7700K | Gigabye Z170N Gaming5 | 16GB Trident Z 3200MHz

Link to comment
Share on other sites

Link to post
Share on other sites

For anyone who is concerned about the bitness of the encryption used, perhaps this could help smooth things over?

 

Edited by TopHatProductions115
Added more sources to consider, considering encryption key length vs. potential benefits in security practice. examples based upon AES encryption algorithm.
Link to comment
Share on other sites

Link to post
Share on other sites

14 hours ago, hey_yo_ said:

If security is concerned, why is it WPA still doesn't implement perfect forward secrecy which makes past and future sessions secrprotected even if the current encryption keys for the present session was stolen.

Because WPA does not use asymmetrical encryption.

While using something like DH during the initial handshake could be used to strengthen against attacks (also enabling perfect forward secrecy), the biggest problem and weakness is the pre-shared key. While it is nice to have PFS, I don't really see a big need for it. It seems like a minor concern compared to MITM attacks (set up rogue AP, send DeAuth and bam, MITM'd) which DH and PFS doesn't protect against.

 

I think the biggest concern is performance though, and the same goes for all the people saying "why only 192 bit key length?"

Because while your phone and laptop might be powerful enough to do longer keys than that, it does have a negative impact on performance. WiFi is used in a lot of embedded devices too and for those, even a small increase in processing requirements can have a massive difference on performance.

 

Besides, going from 128 to 192 is a massive increase anyway. Every single bit added doubles the (theoretical) strength of the cipher. So a "small" 64 bit increase has made it 18446744073709551616 (18 quintillion) times more difficult to brute force.

It was already impossible to break in practice, and now it's kind of ridiculous (but probably easier to market).

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×